Unique value generation and verification method and system

A verification method, the only technology, applied in the field of information security, can solve the problems of access request security risks, low safety factor, etc., to achieve the effect of ensuring verifiability and validity, high security, and expanding the scope of application

Pending Publication Date: 2020-03-24
SUZHOU KEDA TECH
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides a unique value generation and verification method and system to solve the problem in the prior art that the unique value generated by the server is relatively simple, has a low safety factor, and may easily cause security risks in access requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unique value generation and verification method and system
  • Unique value generation and verification method and system
  • Unique value generation and verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as there is no conflict with each other.

[0027] The embodiment of the present invention provides a method for generating a unique value, such as figure 1 As shown, the method for generating the unique value specifically includes:

[0028] Step S1: Obtain the unique value request sent by the client, and the unique value request is used to request a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a unique value generation and verification method and system, and the method comprises the steps: obtaining a unique value request transmitted by a client, the unique value request being used for requesting a unique value; analyzing the unique value request to obtain identification information used for uniquely representing the client; obtaining local current system time anda count value, the count value being an accumulated count value after the local receives the access request each time; and calculating the identification information, the system time and the count value by using a preset algorithm to generate a unique value for verifying the identity of the client. The generated unique value is ensured to have higher security, so that the security and reliabilityof the unique value of the application are ensured, a basis is provided for subsequent security verification of the server on the access request, potential safety hazards caused by illegal access toinformation resources of the server are avoided, and the application range of the unique value in the field of information security is expanded.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for generating and verifying a unique value. Background technique [0002] The generation and verification of unique values ​​are more and more widely used in the field of computer information security. When the client sends an access request to the server, the server will generate a unique value and feed it back to the client. When the client will carry the unique value When the data packet is sent to the server, the server will check the legitimacy of the client by verifying the unique value, thereby ensuring the security of the client's access to information. In the prior art, the unique value generated by the server is often a random number, and the randomness cannot be guaranteed. This unique value may only be a random number generated by a random number generator, and this kind of random number often has a certain generation rule, which has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0869H04L63/08H04L63/0807H04L63/0838
Inventor 常宇宙王彦杰雷心田
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products